How Tokenization Works TransArmor Benefits

5,851 views

Published on

How does the tokenization in First Data's TransArmor solution work?

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
5,851
On SlideShare
0
From Embeds
0
Number of Embeds
26
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

How Tokenization Works TransArmor Benefits

  1. 1. How Does TransArmor SM   Work at the POS? First Data Datacenter PKI Encryption Financial Token Merchant Environment SafeProxy Merchant Anti Fraud Analytics First Data Switch Issuer Transaction Log Settlement Data Warehouse 1 2 3 4 4 6 6 6 6 5 1. Credit Card is swiped at the merchant’s POS 2. PAN/Track data/exp dates encrypted using a Public Key in the POS device and sent to First Data 3. Encrypted Transaction is Decrypted using Private Key in First Data’s HSM 4. Card number is passed to bank for authorization and SafeProxy server for tokenization 5. Authorization and token are returned to the merchant 6. Token is stored in place of the card number in all places 7. Adjustments, refunds, ‘Card not present’, and settlement use the token in place of the card number
  2. 2. How Does TransArmor SM   Work with CNP? First Data Datacenter PKI Encryption Financial Token Merchant Environment Web Server ERP / CRM / Etc. Consumer Token for e-Wallet Consumer SSL Encryption SafeProxy Anti Fraud Analytics First Data Switch Issuer Transaction Log Settlement Data Warehouse 2 3 4 4 6 6 6 6 5 1. Credit Card is keyed into payment page/IVR. If e-Wallet technology is used, a Consumer Token can be used to initiate a new transaction 2. PAN/Track data/exp dates encrypted using a Public Key in the Web Server / ERP / CRM system and sent to First Data 3. Encrypted Transaction is Decrypted using Private Key in First Data’s HSM 4. Card number is passed to bank for authorization and SafeProxy server for tokenization 5. Authorization and token are returned to the merchant 6. Token is stored in place of the card number in all places 7. Adjustments, refunds, ‘Card not present’, and settlement use the token in place of the card number 1 1
  3. 3. First Data ® TransArmor SM Technologies Leveraged <ul><li>Two-level approach to protecting data at every point </li></ul><ul><li>Public/Private Key encryption (Asymmetric) </li></ul><ul><ul><li>Data encrypted at capture with Public Key and can only be decrypted by the Private Key held by First Data </li></ul></ul><ul><ul><li>Encryption is only used to protect PAN during transit or offline situations </li></ul></ul><ul><li>Tokenization </li></ul><ul><ul><li>Replacement of PAN with a random number (Token) - no key to “crack” or steal </li></ul></ul><ul><ul><li>Token uses the same number format as the card data - last 4 digits of PAN are retained in the token </li></ul></ul><ul><ul><li>1:1 Mapping of token to a PAN - the same card always returns the same token </li></ul></ul><ul><ul><li>Token replaces the card data in the merchants system </li></ul></ul>
  4. 4. Benefits <ul><ul><li>The First Data ® TransArmor SM solution removes sensitive payment card data from Merchants systems </li></ul></ul>Key Benefits Risk Reduction <ul><li>Increases security of payment card transactions protecting your brand reputation & revenue stream </li></ul><ul><li>Less complex and more secure than encryption alone </li></ul><ul><li>Warrants against a compromise on the Token </li></ul>Cost Savings <ul><li>Significantly reduces PCI remediation timelines (up to 50%) </li></ul><ul><li>Significantly reduces PCI compliance scope (up to 80%) </li></ul><ul><li>Operational cost that scales with consumption vs. large, recurrent capital outlays </li></ul>Business Continuity <ul><li>Hardware, card association and merchant acquirer agnostic </li></ul><ul><li>Integrates with VARs and Third Party solutions </li></ul><ul><li>Enables continued analytics and reporting capabilities </li></ul><ul><li>Enables cloud computing scenarios </li></ul>

×